Security analytics, trends, experiments, and more.

Blog Categories:

New methods prove it's possible to steal data using only SSL/TLS handshakes. Here's how you can stop it.

ExtraHop has launched Reveal(x), a new security analytics product designed to increase critical asset visibility and automate investigations. Here's how it works.

ExtraHop has launched ExtraHop Reveal(x), a new security analytics product aimed at increasing critical asset visibility and automating investigations.

How to defend against WPAD exploit aPAColypse now

Next gen security programs will be measured by dwell time more than any other metric. Here's why.

Learn about doxware, including why it's becoming more and more popular to cyber criminals, and how to protect against a doxware attack.

See how many times people have tried incorrect passwords on your network, and break it out by username and IP address.

Metcalfe's Law explains the exponential impact of network effects. For IT, this can be a curse and blessing. This lightboard video teaches how this concept can affect your IT strategy.

What is AIOps, why is Gartner talking about it, and why should you care?

ExtraHop has played a role in our security program at Accolade for a number of years, and now with our new AWS-centric posture, it has an even more critical role to fulfill.

Learn why EMA Research picked ExtraHop Addy for a 2017 Innovator's Award, calling the machine learning offering an 'intelligent co-pilot' for stressed network engineers.

The reality in today's data driven IT landscape is that we all want to know basically everything. All the time. Not only do we want to see it all, we want to see it now.

Build Something Great

Join the company that was named one of Seattle's Best Companies to Work For.